CN103716322B - Secret key download method, management method, download management method, secret key download device, secret key management device and secret key download management system - Google Patents

Secret key download method, management method, download management method, secret key download device, secret key management device and secret key download management system Download PDF

Info

Publication number
CN103716322B
CN103716322B CN201310743261.8A CN201310743261A CN103716322B CN 103716322 B CN103716322 B CN 103716322B CN 201310743261 A CN201310743261 A CN 201310743261A CN 103716322 B CN103716322 B CN 103716322B
Authority
CN
China
Prior art keywords
key
rks
ciphertext
sha2
equipment
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201310743261.8A
Other languages
Chinese (zh)
Other versions
CN103716322A (en
Inventor
姚承勇
彭荣收
孟陆强
洪逸轩
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Fujian Landi Commercial Equipment Co Ltd
Original Assignee
Fujian Landi Commercial Equipment Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Fujian Landi Commercial Equipment Co Ltd filed Critical Fujian Landi Commercial Equipment Co Ltd
Priority to CN201310743261.8A priority Critical patent/CN103716322B/en
Publication of CN103716322A publication Critical patent/CN103716322A/en
Application granted granted Critical
Publication of CN103716322B publication Critical patent/CN103716322B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/062Network architectures or network communication protocols for network security for supporting key management in a packet data network for key distribution, e.g. centrally by trusted party
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0807Network architectures or network communication protocols for network security for authentication of entities using tickets, e.g. Kerberos
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0825Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/083Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
    • H04L9/0833Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP] involving conference or group key
    • H04L9/0836Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP] involving conference or group key using tree structure or hierarchical structure
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
    • H04L9/3265Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements using certificate chains, trees or paths; Hierarchical trust model
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/24Key scheduling, i.e. generating round keys or sub-keys for block encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/56Financial cryptography, e.g. electronic payment or e-cash
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/72Signcrypting, i.e. digital signing and encrypting simultaneously

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computing Systems (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a secret key download management method. The method includes the steps that an equipment side authenticates legality of an RKS by verifying a digital signature of a work certificate public key of the RKS; the RKS generates an AT, and after the AT is encrypted by using an equipment identity identification public key of the equipment side, a ciphertext is sent back to the equipment side; the equipment side utilizes an equipment identity identification private key of itself to decrypt the ciphertext, then encrypts the ciphertext by using the work certificate public key and sends the ciphertext back to a secret key server; the secret key server utilizes a work certificate private key of itself to decrypt the ciphertext, compares the decrypted AT and a generated AT and judges whether the decrypted AT and the generated AT are the same, if yes, it shows that a POS terminal of equipment is legal, and then bidirectional identity authentication is achieved.

Description

Key downloading method, management method, downloading management method and device and system
Technical field
The present invention relates to E-Payment field, particularly relate to the key downloading method of a kind of equipment end, manager Method, downloading management method and device and system.
Background technology
Bank card (BANK Card) is more and more universal as the means of payment, common bank card paying system Including point of sales terminal (Point Of Sale, POS), terminal management system (Terminal ManageSystem, TMS), code keypad (PIN PAD) and hardware encryption equipment (Hardware and Security Module, HSM).Wherein POS terminal can accept bank card information, has communication function, and accepts the finger of teller Financial transaction information and the equipment exchanged for information about are made;TMS system carries out concentrate tube to POS terminal Reason, downloads including parameter, and key is downloaded, and accepts, processes or forward the transaction request of POS terminal, and to POS terminal loopback transaction results information, is the system of centralized management and trading processing;Code keypad (PIN PAD) it is that the key that various financial transactions are relevant is carried out safe storage protection, and PIN is encrypted The safety equipment of protection;Hardware encryption equipment (HSM) is the peripheral hardware devices being encrypted transmission data, For the encryption of PIN and deciphering, checking message and the correctness of document source and storage key.Individual's mark Know code (Personal Identification Number, PIN), i.e. personal identification number, be to identify in on-line transaction The data message of holder's identity legitimacy, in cyber-net system, any link does not the most allow with bright The mode of literary composition occurs;Terminal master key (Terminal Master Key, TMK), during POS terminal work, The master key being encrypted working key, is saved in system hardware, can only use, it is impossible to read;POS Terminal be widely used in bank card pay occasion, such as manufacturer's shopping, hotel accommodations etc., be one can not or The modernization means of payment lacked, have incorporated the various occasions of people's life.Bank card, particularly debit card, Typically all being provided with PIN by holder, in carrying out payment process, POS terminal is except above sending bank card Outside the data such as magnetic track information, holder is also wanted to input the PIN identity legitimacy for issuing bank checking holder, Guarantee bank card safety of payment, the property safety of protection holder.In order to prevent PIN from revealing or being cracked, Require that, from terminal to issuing bank in whole information interactive process, whole process carries out safe encipherment protection to PIN, Not in any link of computer network system, PIN occurs in the way of ciphertext, therefore accepts defeated at present The POS terminal entering PIN is desirable that outfit key management system.
The key code system of POS terminal is divided into two grades: terminal master key (TMK) and working key (WK). Wherein TMK is in WK renewal process, and WK is encrypted protection.Every POS terminal and TMS Between share unique TMK, it is necessary to have safeguard protection, it is ensured that can only write device and participate in calculate, no Can read;TMK is a root key the most crucial, if TMK is intercepted, working key just compares appearance Yi Douhui is cracked, by serious threat bank card safety of payment.So TMK to POS can be downloaded safely Terminal, becomes the key of whole POS terminal safety.Conclude existing TMK download scenarios below as follows:
1, scheme is manually entered in plain text: generated TMK in plain text by TMS, manual mode be directly inputted to The code keypad of POS terminal.There are the biggest security breaches in this mode, operator easily intercept TMK In plain text, and there is the probability manually entering mistake, and substantial amounts of equipment needs to input correspondence one by one TMK, generally for improving safety, the TMK of every POS is the most different, management cost and workload The most considerably complicated and huge.
2, IC-card ciphertext import plan: IC-card ciphertext imports.After TMK is generated by TMS, there is IC-card In, and the TMK in IC-card cryptoguard IC-card is set by IC-card holder, when importing POS terminal, After POS terminal code keypad input IC-card password, import to code keypad from IC-card.The program Need inserted IC-card when TMS generates POS terminal by management personnel one by one and arrange IC-card sheet password.And When POS terminal imports, still needing to manually enter IC-card password, IC-card sheet password is revealed and still can be led Cause TMK leakage and there is also risk, and substantial amounts of POS uses this mode, its management cost and workload The hugest.
3, local key mother's POS scheme: the current key paying industry downloads to use locally-downloaded mode more, The master key downloading to financial POS terminal needs this locality just can carry out safe download, i.e. financial POS terminal Need to be carried to the safe machine room of administrative center, and the key mother POS being positioned at safe machine room carry out physical connection, And under the operation of manager, download master key from key mother POS, then financial POS cloth is put into deployment Place, then carry out remote download working key by master key.
Above-mentioned three kinds of schemes all have the disadvantage that: equipment needs the safe machine room of administrative center, by manually Concentrate and download key.Maintenance centre's machine room, workload is big;Equipment needs computing to pacify to administrative center after dispatching from the factory Key downloaded by full machine room just can be deployed to trade company.Cost of transportation rises;Fill key to concentrate down, need big The staff of amount and working time, maintenance cost is big, maintenance period is long.
Currently also there is a kind of remote cipher key download scenarios: program TMS is called encryption equipment and produced a pair public and private key, POS terminal calls code keypad stochastic generation master key TMK, and after being encrypted with the PKI of TMS on Pass to TMS, TMS call encryption equipment and store after private key deciphering TMK, close with TMK encrypted work Key is downloaded to POS terminal.The program has the disadvantage that: TMS lacks identity and differentiates POS terminal, nothing Method prevents pseudo-terminal from connecting TMS and downloads working key;POS terminal lacks the identity to TMS and differentiates, nothing Method prevents pseudo-TMS backstage from downloading pseudo-working key.
Summary of the invention
For solving above-mentioned technical problem, the technical scheme that the present invention uses is:
A kind of key downloading method is provided, including: equipment end sends equipment Serial Number DSN and equipment identities mirror Do not invite and ask to RKS server;Equipment end receives the work CertPubKey that RKS server sends RKS_WCRT_PK and AT_TK1 ciphertext, described AT_TK1 ciphertext is differentiated PKI by equipment identities DIK_PK encryption differentiates that token AT and first transmission key components TK1 obtains;Equipment end uses root public key card The digital signature of book RKS_RCRT verification RKS_WCRT_PK is the most legal, if legal, then uses Equipment identities differentiates that private key DIK_SK deciphering AT_TK1 ciphertext obtains AT and TK1 in plain text, described DIK_PK It is unsymmetrical key pair with DIK_SK;Equipment end produces the 3rd random number as the second transmission key components TK2, obtains TK1 and TK2 XOR transmitting cipher key T K, and the SHA256 check value calculating TK obtains TK_SHA2;Equipment end uses RKS_WCRT_PK encryption AT, TK2 and TK_SHA2 to obtain AT_TK2_TK_SHA2 ciphertext is also sent to RKS server by AT_TK2_TK_SHA2 ciphertext;If Standby end receives the key ciphertext that RKS server sends, and described key ciphertext is needed the close of download by TK encryption Key obtains;Equipment end uses TK decruption key ciphertext to obtain key plain, preserves key to security module; Whether equipment end judges that key is downloaded and completes, if downloaded, removes AT, TK and RKS_WCRT_PK.
Another technical solution used in the present invention is:
A kind of key management method is provided, including: RKS server receives setting of at least one equipment end transmission Standby serial number DSN and equipment identities differentiate request;RKS server reflects from equipment identities with DSN for index Other database of public keys reads corresponding equipment identities and differentiates PKI DIK_PK;RKS server produces 24 bytes One random number is as differentiating token AT, and produces the second random number as the first transmission key components TK1;RKS Server uses DIK_PK encryption AT and TK1 to obtain AT_TK1 ciphertext;RKS server is by employee's card Book PKI RKS_WCRT_PK and AT_TK1 ciphertext send to equipment end;RKS server receives equipment end Send AT_TK2_TK_SHA2 ciphertext, described AT_TK2_TK_SHA2 ciphertext by RKS_WCRT_PK encryption AT, the second transmission key components TK2 and TK_SHA2 obtain, described TK_SHA2 is the SHA256 check value of transmission cipher key T K, and described TK is obtained by TK1 and TK2 XOR; RKS server use work certificate private key RKS_WCRT_SK deciphering AT_TK2_TK_SHA2 ciphertext obtains To AT, TK2 and TK_SHA2 in plain text, described RKS_WCRT_PK and RKS_WCRT_SK right and wrong Symmetric key pair;RKS server judges that the AT received is the most equal with the AT of transmission, if equal, will TK1 and TK2 XOR obtains TK, and the SHA256 check value calculating TK obtains TK_256;RKS services It is the most equal with the TK_SHA2 received that device judges TK_256, if equal, uses TK encryption to need The key downloaded obtains key ciphertext;Key ciphertext is sent to equipment end by RKS server;RKS server Remove AT, TK, complete key and download flow process.
Another technical solution used in the present invention is:
A kind of key downloading management method is provided, including: equipment end sends equipment Serial Number DSN and equipment body Part differentiates that request is to RKS server;RKS server differentiates PKI number for index from equipment identities with DSN Read corresponding equipment identities according to storehouse and differentiate PKI DIK_PK;RKS server produces 24 byte the first randoms number As differentiating token AT, and produce the second random number as the first transmission key components TK1;RKS server DIK_PK encryption AT and TK1 is used to obtain AT_TK1 ciphertext;RKS server is by work CertPubKey RKS_WCRT_PK and AT_TK1 ciphertext sends to equipment end;Equipment end uses root public key certificate The digital signature of RKS_RCRT verification RKS_WCRT_PK is the most legal, if legal, then uses equipment Identity differentiates that private key DIK_SK deciphering AT_TK1 ciphertext obtains AT and TK1 in plain text, described DIK_PK It is unsymmetrical key pair with DIK_SK;Equipment end produces the 3rd random number as the second transmission key components TK2, obtains TK1 and TK2 XOR transmitting cipher key T K, and the SHA256 check value calculating TK obtains TK_SHA2;Equipment end uses RKS_WCRT_PK encryption AT, TK2 and TK_SHA2 to obtain AT_TK2_TK_SHA2 ciphertext is also sent to RKS server by AT_TK2_TK_SHA2 ciphertext;RKS Server use work certificate private key RKS_WCRT_SK deciphering AT_TK2_TK_SHA2 ciphertext obtains In plain text, described RKS_WCRT_PK and RKS_WCRT_SK is non-right for AT, TK2 and TK_SHA2 Claim double secret key;RKS server judges that the AT received is the most equal with the AT of transmission, if equal, will TK1 and TK2 XOR obtains TK, and the SHA256 check value calculating TK obtains TK_256, it is judged that TK_256 The most equal with the TK_SHA2 received, if equal, use TK encryption to need the key downloaded to obtain Key ciphertext is also sent to equipment end by key ciphertext;It is bright that equipment end uses TK decruption key ciphertext to obtain key Literary composition, preserves key to security module;Whether equipment end judges that key is downloaded and completes, if downloaded, Remove AT, TK and RKS_WCRT_PK;RKS server removes AT, TK, completes current-carrying under key Journey.
Another technical solution used in the present invention is:
A kind of key download apparatus is provided, including: differentiate request transmitting unit, be used for sending equipment Serial Number DSN and equipment identities differentiate that request is to RKS server;First receives unit, is used for receiving RKS service Device send work CertPubKey RKS_WCRT_PK and AT_TK1 ciphertext, described AT_TK1 ciphertext by Equipment identities differentiates that PKI DIK_PK encryption differentiates that token AT and first transmission key components TK1 obtains; Server identity verification unit, is used for using root public key certificate RKS_RCRT to verify RKS_WCRT_PK Digital signature the most legal;First decryption unit, for when the verification of server verification unit is legal, making Differentiate that private key DIK_SK deciphering AT_TK1 ciphertext obtains AT and TK1 in plain text with equipment identities, described DIK_PK and DIK_SK is unsymmetrical key pair;Second transmission key components signal generating unit, for generation the Three randoms number are as the second transmission key components TK2;First transmission key arithmetic element, for by TK1 and TK2 XOR obtains transmitting cipher key T K, and the SHA256 check value calculating TK obtains TK_SHA2;First adds Close unit, is used for using RKS_WCRT_PK encryption AT, TK2 and TK_SHA2 to obtain AT_TK2_TK_SHA2 ciphertext;First transmitting element, for sending AT_TK2_TK_SHA2 ciphertext To RKS server;Second receives unit, for receiving the key ciphertext that RKS server sends, described close Key ciphertext is needed the key downloaded to obtain by TK encryption;Second decryption unit, is used for using TK decruption key Ciphertext obtains key plain;Key download unit, for preserving key to security module;First removes list Whether unit, be used for judging that key is downloaded and complete, and remove when the download is completed AT, TK and RKS_WCRT_PK。
Another technical solution used in the present invention is:
A kind of key management apparatus is provided, including: differentiate request reception unit, be used for receiving at least one and set Equipment Serial Number DSN and equipment identities that standby end sends differentiate request;Equipment identities discriminating unit, for From equipment identities, DSN differentiates that database of public keys reads corresponding equipment identities and differentiates PKI DIK_PK for index; Differentiate token signal generating unit, for producing 24 byte the first randoms number as differentiating token AT;First transmission Key generating unit, for producing the second random number as the first transmission key components TK1;Second encryption is single Unit, is used for using DIK_PK encryption AT and TK1 to obtain AT_TK1 ciphertext;Second transmitting element, uses In work CertPubKey RKS_WCRT_PK and AT_TK1 ciphertext are sent to equipment end;3rd receives list Unit, for receiving the AT_TK2_TK_SHA2 ciphertext that equipment end sends, described AT_TK2_TK_SHA2 Ciphertext is encrypted AT by RKS_WCRT_PK, the second transmission key components TK2 and TK_SHA2 obtains, Described TK_SHA2 is the SHA256 check value of transmission cipher key T K, and described TK is different by TK1 and TK2 Or obtain;3rd decryption unit, is used for using work certificate private key RKS_WCRT_SK to decipher AT_TK2_TK_SHA2 ciphertext obtains AT, TK2 and TK_SHA2 in plain text, described RKS_WCRT_PK It is unsymmetrical key pair with RKS_WCRT_SK;Differentiate token verification unit, for judging the AT received The most equal with the AT sent;Second transmission key arithmetic element, for when described discriminating token verification unit When judging equal, TK1 and TK2 XOR obtaining TK, the SHA256 check value calculating TK obtains TK_256;Transmission key verification unit, for judging the TK_256 that the second transmission key arithmetic element generates The most equal with the TK_SHA2 received;3rd ciphering unit, for when described transmission key verification unit When judging equal, TK encryption is used to need the key downloaded to obtain key ciphertext;3rd transmitting element, is used for Key ciphertext is sent to equipment end;Second clearing cell, is used for removing AT, TK, completes current-carrying under key Journey.
Another technical solution used in the present invention is:
A kind of key download management system is provided, connects including RKS server with described RKS server communication At least one equipment end connect, described RKS server includes key management apparatus, described key management apparatus As mentioned above;Described equipment end includes key download apparatus, and described key download apparatus is described above.
The key downloading method of the present invention, management method, downloading management method and device and system, it is achieved set Standby end downloads master key from RKS Server remote, it is to avoid equipment end needs to concentrate could cloth after downloading master key It is put into trade company, after equipment end is dispatched from the factory, directly can be put into deployment place by cloth, it is to avoid need to concentrate equipment end After downloading key to certain fixing machine room, cloth is put into deployment place again.
Accompanying drawing explanation
Fig. 1 is the structured flowchart of a kind of key download management system in an embodiment of the present invention;
Fig. 2 is the structured flowchart of a kind of key download apparatus in an embodiment of the present invention;
Fig. 3 is the structured flowchart of a kind of key management apparatus in an embodiment of the present invention;
Fig. 4 is the flow chart of a kind of key downloading method in an embodiment of the present invention;
Fig. 5 is the flow chart of a kind of key management method in an embodiment of the present invention;
Fig. 6 is the flow chart of a kind of key downloading management method in an embodiment of the present invention.
Main element symbol description
Equipment end 1;Key download apparatus 10;RKS server 3;Key management apparatus 30;
Differentiate request transmitting unit 11;First receives unit 12;Server identity verification unit 13;
First decryption unit 14;Second transmission key components signal generating unit 15;
First transmission key arithmetic element 16;First ciphering unit 17;First transmitting element 18;
Second receives unit 19;Second decryption unit 20;Key download unit 21;First clearing cell 22;
Differentiate request reception unit 31;Equipment identities discriminating unit 32;Differentiate token signal generating unit 33;
First transmission Key generating unit 34;Second ciphering unit 35;Second transmitting element 36;
3rd receives unit 37;3rd decryption unit 38;Differentiate token verification unit 39;
Second transmission key arithmetic element 40;Transmission key verification unit 41;
3rd ciphering unit 42;3rd transmitting element 43;Second clearing cell 44.
Detailed description of the invention
By describing the technology contents of the present invention, structural feature in detail, being realized purpose and effect, below in conjunction with Embodiment also coordinates accompanying drawing to be explained in detail.
First, abbreviation and Key Term to the present invention relates to are defined and illustrate:
Symmetric key: send and receive the both sides of data identical double secret key must be used to be encrypted in plain text and Deciphering computing.Symmetric key encryption algorithm specifically includes that DES, 3DES, IDEA, FEAL, BLOWFISH Deng.
Unsymmetrical key: rivest, shamir, adelman two keys of needs: public-key cryptography (public key) and private There is key (private key).Public-key cryptography and private cipher key are a pair, if entered data with public-key cryptography Row encryption, only could decipher with corresponding private cipher key;If data are encrypted with private cipher key, So only could decipher with corresponding public-key cryptography.Because encrypt use with deciphering two different close Key, so this algorithm is called rivest, shamir, adelman.Rivest, shamir, adelman realizes confidential information exchange Basic process is: Party A generates pair of secret keys and discloses one therein to other side as Public key; The Party B obtaining this Public key uses this double secret key confidential information to be then forwarded to Party A after being encrypted;Party A With another private key oneself preserved, the information after encryption is decrypted again.Party A can use Party B PKI confidential information is encrypted after be then forwarded to Party B;Party B again with the private spoon of oneself to encryption after Information is decrypted.Main algorithm has RSA, Elgamal, knapsack algorithm, Rabin, D-H, ECC (ellipse Circular curve AES).
Digital signature: be the application of non-symetric key cryptography and digital digest technology.Digital signature technology It is that the summary info private key of sender is encrypted, sends recipient together with original text to.Recipient only uses The PKI sent could decipher encrypted summary info, then with the original text received produces a summary letter Breath, with the summary info contrast of deciphering.If identical, then illustrate that the information received is complete, in transmission During be not modified, otherwise descriptive information is modified, and therefore digital signature is able to verify that the complete of information Whole property and legitimacy.Digital signature is a process for encryption, and digital signature authentication is a process for deciphering.
RSA: a kind of asymmetric key algorithm.RSA public key encryption algorithm be 1977 by Ron Rivest, Adi Shamirh and Len Adleman develops in (Massachusetts Institute Technology).RSA is named from developing them The name of three.RSA is the most influential current public key encryption algorithm, and up to the present it can resist Known all cryptographic attacks, are recommended as public key data encryption standard by ISO.RSA Algorithm is based on one ten Divide simple number theory true: to be multiplied by two Big prime the easiest.RSA Algorithm is first and can use simultaneously In the algorithm of encrypted and digitally signed, it is also easy to understand and operation.RSA is to be studied widest PKI Algorithm, from three ten years proposed till now, experienced by the test of various attack, gradually accepts for people, It is widely considered to be one of current classic public key scheme.
TDES Triple-DES:DES is a kind of symmetric encipherment algorithm, and key is 8 bytes.TDES is base In the AES of DES, its key is 16 bytes or 24 bytes.TDES/3DES is English Triple The abbreviated expression (i.e. triple DES) of DES, DES is then English Data Encryption Standard (number According to encryption standard) abbreviated expression.DES is a kind of symmetric key encryption algorithm, i.e. data encryption key and deciphering The AES that key is identical.DES is developed by IBM Corporation at 20 century 70s and discloses, and is subsequently U.S. government uses, and is recognized by NBS and ANSI (ANSI). TDES/3DES is a kind of pattern of des encryption algorithm, and it uses the data key of 3 64 to carry out Tertiary infilling.It it is a safer deformation of DES.
Refer to Fig. 1, be the structured flowchart of a kind of key download management system in an embodiment of the present invention, should Key download management system include RKS server 3 and with described RKS server 3 communication connection at least one Individual equipment end 1, described RKS server 3 includes that key management apparatus 30, described equipment end 1 include key Download apparatus 10, this equipment end 1 is POS terminal, and this RKS server 3 is remote cipher key server, It is positioned at administrative center's machine room, is responsible for generation and the maintenance etc. of the keys such as POS terminal master key, working key, This RKS server 3 includes key database, i.e. the master key data base of POS terminal or working key data Storehouse, represents the TMK key database needed by remote download herein, and this key database is generally by one Special encryption equipment carries out producing and storing key.
Refer to Fig. 2, be the structured flowchart of a kind of key download apparatus in an embodiment of the present invention.A kind of close Key download apparatus 10 includes differentiating that request transmitting unit 11, first receives unit 12, server identity verification Unit the 13, first decryption unit 14, second is transmitted key components signal generating unit 15, first and is transmitted key computing Unit the 16, first ciphering unit the 17, first transmitting element 18, second receives unit 19, second and deciphers single Unit 20, key download unit the 21, first clearing cell 22.
Described discriminating request transmitting unit 11 is used for sending equipment Serial Number DSN and equipment identities differentiates request To RKS server, wherein, DSN and equipment end 1 one_to_one corresponding;First receives unit 12 is used for receiving The work CertPubKey RKS_WCRT_PK of RKS server 3 transmission and AT_TK1 ciphertext, described By equipment identities, AT_TK1 ciphertext differentiates that PKI DIK_PK encryption differentiates that token AT and first transmission key divides Amount TK1 obtains, and wherein, RKS_WCRT_PK comprises the root private key certificate RKS_RCRT_SK number to it Word is signed, it is ensured that RKS_WCRT_PK's is legal, has no idea to forge.Work certificate RKS_WCRT Being a pair unsymmetrical key pair, if RSA key, minimum 2048 of figure place, work certificate RKS_WCRT It is made up of work CertPubKey RKS_WCRT_PK and work certificate private key RKS_WCRT_SK, RKS_WCRT needs to be saved in security medium, for example, it is possible to static storage conduct backup in IC-card, It is then introduced in the secure storage medium of RKS server 3.
Server identity verification unit 13 is used for using root public key certificate RKS_RCRT_PK to verify The digital signature of RKS_WCRT_PK is the most legal, and wherein, RKS_RCRT_PK dispatches from the factory in equipment end 1 Time prepackage in firmware, key server root certificate RKS_RCRT is a pair unsymmetrical key pair, if RSA key, minimum 2048 of number, RKS_RCRT is by root public key certificate RKS_RCRT_PK and root Private key certificate RKS_RCRT_SK forms, and RKS_RCRT_PK is for verifying the conjunction of RKS_WCRT_PK Method.RKS_RCRT_SK is used for producing digital signature and signs to RKS_WCRT_PK. RKS_RCRT needs to be stored in security medium, and root private key certificate RKS_RCRT_SK needs strict protection, Can be saved in IC-card, be only used for work CertPubKey RKS_WCRT_PK is signed.
First decryption unit 14, for when server identity verification unit 13 verifies legal, uses equipment body Part differentiates that private key DIK_SK deciphering AT_TK1 ciphertext obtains AT and TK1 in plain text, and equipment identities differentiates close Key is a pair unsymmetrical key pair to DIK, is made up of DIK_PK and DIK_SK, and this double secret key can be by Equipment end 1 internal random generates, or is imported to set by after the generation of external key maker in a secure environment Standby end 1, DIK_PK, after equipment end 1 is dispatched from the factory, derives in equipment end 1 or generates from special key Device is derived, and is stored in the equipment body of RKS server 3 with DSN for index and DSN one to one Part differentiates in database of public keys, owing to DIK_PK is PKI, can be with plaintext transmission, and such as, pass through mail Or other easily mode be transmitted.DIK_SK is saved in security medium by equipment end 1, equipment end 1 has attack protection mechanism, it is ensured that destroy DIK_SK after under attack immediately.Wherein, described DIK_PK and DIK_SK is RSA, Elgamal, knapsack algorithm, Rabin, D-H, ECC (elliptic curve encryption algorithm) Deng unsymmetrical key, in the present embodiment, described DIK_PK and DIK_SK is RSA key pair.
Second transmission key components signal generating unit 15 is for producing the 3rd random number as the second transmission key components TK2;First transmission key arithmetic element 16 for obtaining transmitting cipher key T K, meter by TK1 and TK2 XOR The SHA256 check value calculating TK obtains TK_SHA2;First ciphering unit 17 is used for using RKS_WCRT_PK encryption AT, TK2 and TK_SHA2 obtain AT_TK2_TK_SHA2 ciphertext;The One transmitting element 18 is for sending AT_TK2_TK_SHA2 ciphertext to RKS server 3;Second receives Unit 19 is for receiving the key ciphertext that RKS server 3 sends, and described key ciphertext is needed by TK encryption The key downloaded obtains;Second decryption unit 20 is used for using TK decruption key ciphertext to obtain key plain; Key download unit 21 is for preserving key to security module;First clearing cell 22 is used for judging key Download and whether complete, and remove AT, TK and RKS_WCRT_PK when the download is completed.
Refer to Fig. 3, be the structured flowchart of a kind of key management apparatus in an embodiment of the present invention.A kind of Key management apparatus 30 includes differentiating request reception unit 31, equipment identities discriminating unit 32, differentiating token Signal generating unit the 33, first transmission Key generating unit the 34, second ciphering unit the 35, second transmitting element 36, 3rd receives unit the 37, the 3rd decryption unit 38, the 39, the second transmission key computing of discriminating token verification unit Unit 40, transmission key verification unit the 41, the 3rd ciphering unit the 42, the 3rd transmitting element 43, second are clear Except unit 44.
Differentiate that request reception unit 31 is for receiving the equipment Serial Number DSN that at least one equipment end 1 sends Request is differentiated with equipment identities;Equipment identities discriminating unit 32 is for reflecting from equipment identities with DSN for index Other database of public keys reads corresponding equipment identities and differentiates PKI DIK_PK;Differentiate that token signal generating unit 33 is used for Produce 24 byte the first randoms number as differentiating token AT;First transmission Key generating unit 34 is used for producing Second random number is as the first transmission key components TK1;Second ciphering unit 35 is used for using DIK_PK to add Close AT and TK1 obtains AT_TK1 ciphertext;Second transmitting element 36 is for by work CertPubKey RKS_WCRT_PK and AT_TK1 ciphertext sends to equipment end;3rd receives unit 37 is used for receiving equipment End 1 transmission AT_TK2_TK_SHA2 ciphertext, described AT_TK2_TK_SHA2 ciphertext by RKS_WCRT_PK encryption AT, the second transmission key components TK2 and TK_SHA2 obtain, described TK_SHA2 is the SHA256 check value of transmission cipher key T K, and described TK is obtained by TK1 and TK2 XOR; 3rd decryption unit 38 is used for using work certificate private key RKS_WCRT_SK to decipher AT_TK2_TK_SHA2 ciphertext obtains AT, TK2 and TK_SHA2 in plain text, described RKS_WCRT_PK It is unsymmetrical key pair with RKS_WCRT_SK;Differentiate that token verification unit 39 is for judging the AT received The most equal with the AT sent;Second transmission key arithmetic element 40 is for when described discriminating token verification list When unit 39 judges equal, TK1 and TK2 XOR obtaining TK, the SHA256 check value calculating TK obtains To TK_256;Transmission key verification unit 41 is for judging what the second transmission key arithmetic element 40 generated TK_256 is the most equal with the TK_SHA2 received;3rd ciphering unit 42 is for when described transmission key When verification unit 41 judges equal, TK encryption is used to need the key downloaded to obtain key ciphertext;3rd Send unit 43 for sending key ciphertext to equipment end 1;Second clearing cell 44 is used for removing AT, TK, Complete key and download flow process.
Refer to Fig. 4, be the flow chart of a kind of key downloading method in an embodiment of the present invention.Under this key Support method runs in described equipment end 1, and the method includes:
Step S101, equipment end send equipment Serial Number DSN and equipment identities differentiates that request services to RKS Device;
Step S102, equipment end receive the work CertPubKey RKS_WCRT_PK that RKS server sends With AT_TK1 ciphertext, by equipment identities, described AT_TK1 ciphertext differentiates that PKI DIK_PK encryption differentiates order Board AT and first transmission key components TK1 obtains;
Step S103, equipment end use the number of root public key certificate RKS_RCRT verification RKS_WCRT_PK Word signature is the most legal, if legal, then uses equipment identities to differentiate that private key DIK_SK deciphers AT_TK1 Ciphertext obtains AT and TK1 in plain text, and described DIK_PK and DIK_SK is unsymmetrical key pair;
Step S104, equipment end produce the 3rd random number as the second transmission key components TK2, by TK1 and TK2 XOR obtains transmitting cipher key T K, and the SHA256 check value calculating TK obtains TK_SHA2;
Step S105, equipment end use RKS_WCRT_PK encryption AT, TK2 and TK_SHA2 to obtain AT_TK2_TK_SHA2 ciphertext is also sent to RKS server by AT_TK2_TK_SHA2 ciphertext;
Step S106, equipment end receive the key ciphertext that RKS server sends, and described key ciphertext is by TK Encryption needs the key downloaded to obtain;
Step S107, equipment end use TK decruption key ciphertext to obtain key plain, preserve key to peace Full module;
Whether step S108, equipment end judge that key is downloaded and complete, if downloaded, remove AT, TK And RKS_WCRT_PK.
Refer to Fig. 5, be the flow chart of a kind of key management method in an embodiment of the present invention.This key pipe Reason method runs in described RKS server 3, and the method includes:
Step S201, RKS server receive the equipment Serial Number DSN of at least one equipment end transmission and set Standby identity differentiates request;
From equipment identities, step S202, RKS server differentiate that database of public keys reads phase for index with DSN The equipment identities answered differentiates PKI DIK_PK;
Step S203, RKS server produce 24 byte the first randoms number as differentiating token AT, and produce Second random number is as the first transmission key components TK1;
Step S204, RKS server use DIK_PK encryption AT and TK1 to obtain AT_TK1 ciphertext;
Step S205, RKS server are by work CertPubKey RKS_WCRT_PK and AT_TK1 ciphertext Send to equipment end;
Step S206, RKS server receive the AT_TK2_TK_SHA2 ciphertext that equipment end sends, described AT_TK2_TK_SHA2 ciphertext is encrypted AT, the second transmission key components TK2 by RKS_WCRT_PK Obtaining with TK_SHA2, described TK_SHA2 is the SHA256 check value of transmission cipher key T K, described TK Obtained by TK1 and TK2 XOR;
Step S207, RKS server use work certificate private key RKS_WCRT_SK decipher AT_TK2_TK_SHA2 ciphertext obtains AT, TK2 and TK_SHA2 in plain text, described RKS_WCRT_PK It is unsymmetrical key pair with RKS_WCRT_SK;
Step S208, RKS server judge that the AT received is the most equal with the AT of transmission, if equal, TK1 and TK2 XOR obtains TK, and the SHA256 check value calculating TK obtains TK_256;
It is the most equal with the TK_SHA2 received that step S209, RKS server judge TK_256, as The most equal, use TK encryption to need the key downloaded to obtain key ciphertext;
Key ciphertext is sent to equipment end by step S210, RKS server;
Step S211, RKS server remove AT, TK, complete key and download flow process.
Refer to Fig. 6, be the flow chart of a kind of key downloading management method in an embodiment of the present invention.This is close Key downloading management method runs in described key download management system, and the method includes:
Step S301, equipment end send equipment Serial Number DSN and equipment identities differentiates that request services to RKS Device;
From equipment identities, step S302, RKS server differentiate that database of public keys reads phase for index with DSN The equipment identities answered differentiates PKI DIK_PK;
Step S303, RKS server produce 24 byte the first randoms number as differentiating token AT, and produce Second random number is as the first transmission key components TK1;
Step S304, RKS server use DIK_PK encryption AT and TK1 to obtain AT_TK1 ciphertext;
Step S305, RKS server are by work CertPubKey RKS_WCRT_PK and AT_TK1 ciphertext Send to equipment end;
Step S306, equipment end use the number of root public key certificate RKS_RCRT verification RKS_WCRT_PK Word signature is the most legal, if legal, perform step S307, otherwise, performs step S311;
Step S307, equipment end use equipment identities to differentiate, and private key DIK_SK deciphering AT_TK1 ciphertext obtains In plain text, described DIK_PK and DIK_SK is unsymmetrical key pair to AT and TK1;
Step S308, equipment end produce the 3rd random number as the second transmission key components TK2, by TK1 and TK2 XOR obtains transmitting cipher key T K, and the SHA256 check value calculating TK obtains TK_SHA2;
Step S309, equipment end use RKS_WCRT_PK encryption AT, TK2 and TK_SHA2 to obtain AT_TK2_TK_SHA2 ciphertext;
AT_TK2_TK_SHA2 ciphertext is sent to RKS server by step S310, equipment end;
Step S311, discriminating RKS server failure, terminate to download flow process;
Step S312, RKS server use work certificate private key RKS_WCRT_SK decipher AT_TK2_TK_SHA2 ciphertext obtains AT, TK2 and TK_SHA2 in plain text, described RKS_WCRT_PK It is unsymmetrical key pair with RKS_WCRT_SK;
Step S313, RKS server judge that the AT received is the most equal with the AT of transmission, if equal, Perform step S314, otherwise, perform step S316;
TK1 and TK2 XOR is obtained TK by step S314, RKS server, calculates the SHA256 of TK Check value obtains TK_256, it is judged that TK_256 is the most equal with the TK_SHA2 received, if equal, Perform step S315, otherwise, perform step S316;
Step S315, the key using TK encryption needs to download obtain key ciphertext and key ciphertext are sent To equipment end;
The failure of step S316, authentication equipment end, terminates to download flow process;
Step S317, equipment end use TK decruption key ciphertext to obtain key plain, preserve key to peace Full module;
Whether step S318, equipment end judge that key is downloaded and complete, if downloaded, perform step S319, Otherwise, step S301 is returned;
Step S319, equipment end remove AT, TK and RKS_WCRT_PK;
Step S320, RKS server remove AT, TK, complete key and download flow process.
The key downloading method of the present invention, management method, downloading management method and device and system, it is achieved set Standby end downloads master key from RKS Server remote, it is to avoid equipment end needs to concentrate could cloth after downloading master key It is put into trade company, after equipment end is dispatched from the factory, directly can be put into deployment place by cloth, it is to avoid need to concentrate equipment end After downloading key to certain fixing machine room, cloth is put into deployment place again;
Unsymmetrical key management technique is utilized to realize two-way legal identity certification, it is ensured that RKS server and equipment The legitimacy of end both sides' identity, equipment end is by the digital signature of the work CertPubKey of verification RKS server Carrying out the legitimacy of certification RKS server, RKS server generates one and differentiates token AT, by equipment end After equipment identities differentiates public key encryption, ciphertext returning to equipment end, equipment end differentiates private with its equipment identities After key deciphering, then return to key server after recruitment deposition public key encryption, its work of key server After certificate private key deciphering the discriminating token AT of the discriminating token AT of contrast deciphering again and generation whether as, one Sample then represents that equipment POS terminal is legal, thus realizes bidirectional identity authentication;
Utilizing the symmetric key of stochastic generation to protect the key of download, the TMK of line transmission is interim by one Transmission key encryption, transmission key is by POS terminal and key server each self-generating one-component, and uses It is transferred to the other side after the public key encryption of the other side, it is achieved the synchronization of occasional transmission key, thus improves TMK transmission Safety and efficiency.
The foregoing is only embodiments of the invention, not thereby limit the scope of the claims of the present invention, every profit The equivalent structure made by description of the invention and accompanying drawing content or equivalence flow process conversion, or directly or indirectly transport It is used in other relevant technical fields, is the most in like manner included in the scope of patent protection of the present invention.

Claims (6)

1. a key downloading method, it is characterised in that including:
Equipment end sends equipment Serial Number DSN and equipment identities differentiates that request is to RKS server;
Equipment end receives work CertPubKey RKS_WCRT_PK and AT_TK1 that RKS server sends Ciphertext, by equipment identities, described AT_TK1 ciphertext differentiates that PKI DIK_PK encryption differentiates token AT and first Transmission key components TK1 obtains;
Whether the digital signature of equipment end use root public key certificate RKS_RCRT verification RKS_WCRT_PK Legal, if legal, then private key DIK_SK deciphering AT_TK1 ciphertext obtains AT to use equipment identities to differentiate With TK1 in plain text, described DIK_PK and DIK_SK is unsymmetrical key pair;
Equipment end produces the 3rd random number and transmits key components TK2 as second, is obtained by TK1 and TK2 XOR To transmission cipher key T K, the SHA256 check value calculating TK obtains TK_SHA2;
Equipment end uses RKS_WCRT_PK encryption AT, TK2 and TK_SHA2 to obtain AT_TK2_TK_SHA2 ciphertext is also sent to RKS server by AT_TK2_TK_SHA2 ciphertext;
Equipment end receives the key ciphertext that RKS server sends, under described key ciphertext is needed by TK encryption The key carried obtains;
Equipment end uses TK decruption key ciphertext to obtain key plain, preserves key to security module;
Equipment end judge key download whether complete, if downloaded, removing AT, TK and RKS_WCRT_PK。
2. a key management method, it is characterised in that including:
RKS server receive at least one equipment end send equipment Serial Number DSN and equipment identities differentiate please Ask;
From equipment identities, RKS server differentiates that database of public keys reads corresponding equipment identities for index with DSN Differentiate PKI DIK_PK;
RKS server produces 24 byte the first randoms number as differentiating token AT, and produces the second random number As the first transmission key components TK1;
RKS server uses DIK_PK encryption AT and TK1 to obtain AT_TK1 ciphertext;
Work CertPubKey RKS_WCRT_PK and AT_TK1 ciphertext are sent to equipment by RKS server End;
RKS server receives the AT_TK2_TK_SHA2 ciphertext that equipment end sends, described AT_TK2_TK_SHA2 ciphertext is encrypted AT, the second transmission key components TK2 by RKS_WCRT_PK Obtaining with TK_SHA2, described TK_SHA2 is the SHA256 check value of transmission cipher key T K, described TK Obtained by TK1 and TK2 XOR;
RKS server use work certificate private key RKS_WCRT_SK deciphering AT_TK2_TK_SHA2 is close Literary composition obtains AT, TK2 and TK_SHA2 in plain text, described RKS_WCRT_PK and RKS_WCRT_SK It it is unsymmetrical key pair;
RKS server judges that the AT that receives is the most equal with the AT of transmission, if equal, by TK1 with TK2 XOR obtains TK, and the SHA256 check value calculating TK obtains TK_256;
It is the most equal with the TK_SHA2 received that RKS server judges TK_256, if equal, uses TK encryption needs the key downloaded to obtain key ciphertext;
Key ciphertext is sent to equipment end by RKS server;
RKS server removes AT, TK, completes key and downloads flow process.
3. a key downloading management method, it is characterised in that including:
Equipment end sends equipment Serial Number DSN and equipment identities differentiates that request is to RKS server;
From equipment identities, RKS server differentiates that database of public keys reads corresponding equipment identities for index with DSN Differentiate PKI DIK_PK;
RKS server produces 24 byte the first randoms number as differentiating token AT, and produces the second random number As the first transmission key components TK1;
RKS server uses DIK_PK encryption AT and TK1 to obtain AT_TK1 ciphertext;
Work CertPubKey RKS_WCRT_PK and AT_TK1 ciphertext are sent to equipment by RKS server End;
Whether the digital signature of equipment end use root public key certificate RKS_RCRT verification RKS_WCRT_PK Legal, if legal, then private key DIK_SK deciphering AT_TK1 ciphertext obtains AT to use equipment identities to differentiate With TK1 in plain text, described DIK_PK and DIK_SK is unsymmetrical key pair;
Equipment end produces the 3rd random number and transmits key components TK2 as second, is obtained by TK1 and TK2 XOR To transmission cipher key T K, the SHA256 check value calculating TK obtains TK_SHA2;
Equipment end uses RKS_WCRT_PK encryption AT, TK2 and TK_SHA2 to obtain AT_TK2_TK_SHA2 ciphertext is also sent to RKS server by AT_TK2_TK_SHA2 ciphertext;
RKS server use work certificate private key RKS_WCRT_SK deciphering AT_TK2_TK_SHA2 is close Literary composition obtains AT, TK2 and TK_SHA2 in plain text, described RKS_WCRT_PK and RKS_WCRT_SK It it is unsymmetrical key pair;
RKS server judges that the AT that receives is the most equal with the AT of transmission, if equal, by TK1 with TK2 XOR obtains TK, and the SHA256 check value calculating TK obtains TK_256, it is judged that TK_256 with connect The TK_SHA2 received is the most equal, if equal, uses TK encryption to need the key downloaded to obtain key Key ciphertext is also sent to equipment end by ciphertext;
Equipment end uses TK decruption key ciphertext to obtain key plain, preserves key to security module;
Equipment end judge key download whether complete, if downloaded, removing AT, TK and RKS_WCRT_PK;
RKS server removes AT, TK, completes key and downloads flow process.
4. a key download apparatus, it is characterised in that including:
Differentiate request transmitting unit, be used for sending equipment Serial Number DSN and equipment identities differentiates to ask to RKS Server;
First receives unit, for receiving the work CertPubKey RKS_WCRT_PK that RKS server sends With AT_TK1 ciphertext, by equipment identities, described AT_TK1 ciphertext differentiates that PKI DIK_PK encryption differentiates order Board AT and first transmission key components TK1 obtains;
Server identity verification unit, is used for using root public key certificate RKS_RCRT to verify The digital signature of RKS_WCRT_PK is the most legal;
First decryption unit, for when the verification of server verification unit is legal, using equipment identities to differentiate private Key DIK_SK deciphering AT_TK1 ciphertext obtains AT and TK1 in plain text, described DIK_PK and DIK_SK It it is unsymmetrical key pair;
Second transmission key components signal generating unit, for producing the 3rd random number as the second transmission key components TK2;
First transmission key arithmetic element, for obtaining transmitting cipher key T K, calculating by TK1 and TK2 XOR The SHA256 check value of TK obtains TK_SHA2;
First ciphering unit, is used for using RKS_WCRT_PK encryption AT, TK2 and TK_SHA2 to obtain To AT_TK2_TK_SHA2 ciphertext;
First transmitting element, for sending AT_TK2_TK_SHA2 ciphertext to RKS server;
Second receives unit, and for receiving the key ciphertext that RKS server sends, described key ciphertext is by TK Encryption needs the key downloaded to obtain;
Second decryption unit, is used for using TK decruption key ciphertext to obtain key plain;
Key download unit, for preserving key to security module;
Whether the first clearing cell, be used for judging that key is downloaded and complete, and remove AT, TK when the download is completed And RKS_WCRT_PK.
5. a key management apparatus, it is characterised in that including:
Differentiate request reception unit, for receiving the equipment Serial Number DSN of at least one equipment end transmission and setting Standby identity differentiates request;
From equipment identities, equipment identities discriminating unit, for differentiating that database of public keys reads phase for index with DSN The equipment identities answered differentiates PKI DIK_PK;
Differentiate token signal generating unit, for producing 24 byte the first randoms number as differentiating token AT;
First transmission Key generating unit, for producing the second random number as the first transmission key components TK1;
Second ciphering unit, is used for using DIK_PK encryption AT and TK1 to obtain AT_TK1 ciphertext;
Second transmitting element, for sending work CertPubKey RKS_WCRT_PK and AT_TK1 ciphertext To equipment end;
3rd receives unit, for receiving the AT_TK2_TK_SHA2 ciphertext that equipment end sends, described AT_TK2_TK_SHA2 ciphertext is encrypted AT, the second transmission key components TK2 by RKS_WCRT_PK Obtaining with TK_SHA2, described TK_SHA2 is the SHA256 check value of transmission cipher key T K, described TK Obtained by TK1 and TK2 XOR;
3rd decryption unit, is used for using work certificate private key RKS_WCRT_SK to decipher AT_TK2_TK_SHA2 ciphertext obtains AT, TK2 and TK_SHA2 in plain text, described RKS_WCRT_PK It is unsymmetrical key pair with RKS_WCRT_SK;
Differentiate token verification unit, the most equal with the AT of transmission for judging the AT received;
Second transmission key arithmetic element, for when described discriminating token verification unit judges equal, by TK1 Obtaining TK with TK2 XOR, the SHA256 check value calculating TK obtains TK_256;
Transmission key verification unit, for judging TK_256 and the reception of the second transmission key arithmetic element generation The TK_SHA2 arrived is the most equal;
3rd ciphering unit, for when described transmission key verification unit judges equal, uses TK encryption to need Key to be downloaded obtains key ciphertext;
3rd transmitting element, for sending key ciphertext to equipment end;
Second clearing cell, is used for removing AT, TK, completes key and downloads flow process.
6. a key download management system, connects including RKS server with described RKS server communication At least one equipment end connect, it is characterised in that described RKS server includes key management apparatus, described Key management apparatus is as described in right 5;Described equipment end includes key download apparatus, carries under described key Put as claimed in claim 4.
CN201310743261.8A 2013-03-15 2013-12-27 Secret key download method, management method, download management method, secret key download device, secret key management device and secret key download management system Active CN103716322B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310743261.8A CN103716322B (en) 2013-03-15 2013-12-27 Secret key download method, management method, download management method, secret key download device, secret key management device and secret key download management system

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
CN2013100846716 2013-03-15
CN201310084671.6 2013-03-15
CN2013100846716A CN103220270A (en) 2013-03-15 2013-03-15 Downloading method, management method, downloading management method, downloading management device and downloading management system for secret key
CN201310743261.8A CN103716322B (en) 2013-03-15 2013-12-27 Secret key download method, management method, download management method, secret key download device, secret key management device and secret key download management system

Publications (2)

Publication Number Publication Date
CN103716322A CN103716322A (en) 2014-04-09
CN103716322B true CN103716322B (en) 2017-01-11

Family

ID=48817735

Family Applications (2)

Application Number Title Priority Date Filing Date
CN2013100846716A Withdrawn CN103220270A (en) 2013-03-15 2013-03-15 Downloading method, management method, downloading management method, downloading management device and downloading management system for secret key
CN201310743261.8A Active CN103716322B (en) 2013-03-15 2013-12-27 Secret key download method, management method, download management method, secret key download device, secret key management device and secret key download management system

Family Applications Before (1)

Application Number Title Priority Date Filing Date
CN2013100846716A Withdrawn CN103220270A (en) 2013-03-15 2013-03-15 Downloading method, management method, downloading management method, downloading management device and downloading management system for secret key

Country Status (3)

Country Link
US (1) US9647845B2 (en)
CN (2) CN103220270A (en)
WO (1) WO2014139344A1 (en)

Families Citing this family (50)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB201105765D0 (en) 2011-04-05 2011-05-18 Visa Europe Ltd Payment system
CN103714638B (en) * 2013-03-15 2015-09-30 福建联迪商用设备有限公司 A kind of method and system of quick position terminal master key failed download
CN103220270A (en) * 2013-03-15 2013-07-24 福建联迪商用设备有限公司 Downloading method, management method, downloading management method, downloading management device and downloading management system for secret key
CN104426664A (en) * 2013-09-09 2015-03-18 东方钢铁电子商务有限公司 Electronic signature method for data security platform
US9350550B2 (en) * 2013-09-10 2016-05-24 M2M And Iot Technologies, Llc Power management and security for wireless modules in “machine-to-machine” communications
CN103595718B (en) * 2013-11-15 2016-08-10 拉卡拉支付有限公司 A kind of POS terminal Activiation method, system, service platform and POS terminal
CN104700261B (en) * 2013-12-10 2018-11-27 ***股份有限公司 The safe networking initial method and its system of POS terminal
US9922322B2 (en) * 2013-12-19 2018-03-20 Visa International Service Association Cloud-based transactions with magnetic secure transmission
US11164176B2 (en) 2013-12-19 2021-11-02 Visa International Service Association Limited-use keys and cryptograms
US9807612B2 (en) * 2014-04-25 2017-10-31 Tendyron Corporation Secure data interaction method and system
AU2015264124B2 (en) 2014-05-21 2019-05-09 Visa International Service Association Offline authentication
US9584492B2 (en) * 2014-06-23 2017-02-28 Vmware, Inc. Cryptographic proxy service
US9775029B2 (en) 2014-08-22 2017-09-26 Visa International Service Association Embedding cloud-based functionalities in a communication device
CN104243484B (en) * 2014-09-25 2016-04-13 小米科技有限责任公司 Information interacting method and device, electronic equipment
CN106161359B (en) * 2015-04-02 2019-09-17 阿里巴巴集团控股有限公司 It authenticates the method and device of user, register the method and device of wearable device
CN105071935A (en) * 2015-07-09 2015-11-18 浪潮通用软件有限公司 Data processing method, heterogeneous system and integrated system
US20170076106A1 (en) * 2015-09-16 2017-03-16 Qualcomm Incorporated Apparatus and method to securely control a remote operation
CN105790934B (en) * 2016-03-04 2019-03-15 ***股份有限公司 A kind of adaptive POS terminal configuration method configures power assignment method with it
CN106357394A (en) * 2016-08-29 2017-01-25 福建新大陆支付技术有限公司 Secure method of filling key for Parent POS
CN106651555A (en) * 2016-09-28 2017-05-10 山东浪潮商用***有限公司 Method for online billing machine to share network, online billing machine, and system for online billing machine to share network
CN107888475B (en) * 2016-09-30 2020-09-08 中国石油天然气股份有限公司 Mail decryption method and server
CN107040369B (en) * 2016-10-26 2020-02-11 阿里巴巴集团控股有限公司 Data transmission method, device and system
CN108011715B (en) 2016-10-31 2021-03-23 华为技术有限公司 Key distribution method, related equipment and system
CN106656488B (en) * 2016-12-07 2020-04-03 百富计算机技术(深圳)有限公司 Key downloading method and device for POS terminal
CN106789018B (en) * 2016-12-20 2019-10-08 百富计算机技术(深圳)有限公司 Secret key remote acquisition methods and device
US10438006B2 (en) 2017-07-27 2019-10-08 Citrix Systems, Inc. Secure information storage
WO2019080109A1 (en) * 2017-10-27 2019-05-02 福建联迪商用设备有限公司 Terminal random number generation method and system
CN107888381B (en) * 2017-11-09 2020-08-07 飞天诚信科技股份有限公司 Method, device and system for realizing key import
CN108764869A (en) * 2018-05-28 2018-11-06 北京比特大陆科技有限公司 A kind of encrypted method and apparatus of realization Transaction Information
CN109067528B (en) * 2018-08-31 2020-05-12 阿里巴巴集团控股有限公司 Password operation method, work key creation method, password service platform and equipment
CN109309567A (en) * 2018-09-04 2019-02-05 福建联迪商用设备有限公司 A kind of method and system for transmitting key
CN109274500B (en) * 2018-10-15 2020-06-02 百富计算机技术(深圳)有限公司 Secret key downloading method, client, password equipment and terminal equipment
CN111181894B (en) * 2018-11-09 2023-06-06 北京天德科技有限公司 Network communication method for enabling block chain nodes to efficiently communicate and safely
US11005828B1 (en) * 2018-11-19 2021-05-11 Bae Systems Information And Electronic Systems Integration Inc. Securing data at rest
CN109495307A (en) * 2018-11-27 2019-03-19 北京车和家信息技术有限公司 Method for upgrading system, OTA upgrade package encryption method, terminal device and vehicle
CN111339537B (en) * 2018-12-18 2023-03-14 武汉信安珞珈科技有限公司 Method and system for detecting digital certificate
WO2020133068A1 (en) * 2018-12-27 2020-07-02 福建联迪商用设备有限公司 Key transfer method, terminal and system
CN109728906B (en) * 2019-01-11 2021-07-27 如般量子科技有限公司 Anti-quantum-computation asymmetric encryption method and system based on asymmetric key pool
EP3720165A1 (en) * 2019-03-30 2020-10-07 Illotros GmbH Method for proving at least one of identity and entitlement
CN110061848B (en) * 2019-04-17 2021-09-14 飞天诚信科技股份有限公司 Method for safely importing secret key of payment terminal, payment terminal and system
US20220263819A1 (en) * 2019-07-12 2022-08-18 Lg Electronics Inc. Mutual authentication and re-authentication method between wireless power transmitting device and wireless power receiving device, and wireless power transmitting device and wireless power receiving device using same
CN112422475B (en) * 2019-08-20 2022-12-09 阿里巴巴(北京)软件服务有限公司 Service authentication method, device, system and storage medium
CN111131278B (en) * 2019-12-27 2022-09-06 京东科技控股股份有限公司 Data processing method and device, computer storage medium and electronic equipment
CN111884804A (en) * 2020-06-15 2020-11-03 上海祥承通讯技术有限公司 Remote key management method
US11368314B2 (en) * 2020-11-13 2022-06-21 Microsoft Technology Licensing, Llc Secure digital signing
CN112769778B (en) * 2020-12-28 2023-05-23 福建正孚软件有限公司 Encryption and decryption processing method and system based on cross-network cross-border data security transmission
CN115174040B (en) * 2022-02-22 2024-06-21 重庆长安汽车股份有限公司 Method, system, vehicle and medium for injecting and updating secret key of in-vehicle controller
CN114567431B (en) * 2022-02-28 2023-09-12 中国人民解放军空军预警学院 Security authentication method for unidirectional transmission
CN116886317B (en) * 2023-09-07 2023-11-07 飞天诚信科技股份有限公司 Method, system and equipment for distributing secret key between server and terminal equipment
CN117974170B (en) * 2024-03-29 2024-06-11 江西安图游科技有限公司 Scenic spot data management method and system based on electronic ticket verification

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102013982A (en) * 2010-12-01 2011-04-13 银联商务有限公司 Long-distance encryption method and device, management method and device, as well as encryption management method and device
CN102647274A (en) * 2012-04-12 2012-08-22 福建联迪商用设备有限公司 POS (Point of Sale) terminal, terminal accessing device, main key managing system and method thereof

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7472394B1 (en) * 2000-07-07 2008-12-30 Paymentech, L.P. System and method for programming point of sale devices
CN101930644B (en) * 2009-06-25 2014-04-16 ***股份有限公司 Method for safely downloading master key automatically in bank card payment system and system thereof
CN102064939B (en) 2009-11-13 2013-06-12 福建联迪商用设备有限公司 Method for authenticating point of sail (POS) file and method for maintaining authentication certificate
WO2013109932A1 (en) * 2012-01-18 2013-07-25 OneID Inc. Methods and systems for secure identity management
CN102624710B (en) 2012-02-27 2015-03-11 福建联迪商用设备有限公司 Sensitive information transmission method and sensitive information transmission system
CN102957541B (en) * 2012-11-21 2016-11-16 浪潮集团有限公司 A kind of cipher encrypting method based on SAAS
CN103220270A (en) 2013-03-15 2013-07-24 福建联迪商用设备有限公司 Downloading method, management method, downloading management method, downloading management device and downloading management system for secret key

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102013982A (en) * 2010-12-01 2011-04-13 银联商务有限公司 Long-distance encryption method and device, management method and device, as well as encryption management method and device
CN102647274A (en) * 2012-04-12 2012-08-22 福建联迪商用设备有限公司 POS (Point of Sale) terminal, terminal accessing device, main key managing system and method thereof

Also Published As

Publication number Publication date
CN103716322A (en) 2014-04-09
CN103220270A (en) 2013-07-24
US20160028548A1 (en) 2016-01-28
US9647845B2 (en) 2017-05-09
WO2014139344A1 (en) 2014-09-18

Similar Documents

Publication Publication Date Title
CN103716322B (en) Secret key download method, management method, download management method, secret key download device, secret key management device and secret key download management system
CN103714642B (en) Key downloading method, management method, downloading management method and device and system
CN103701812B (en) TMK (Terminal Master Key) secure downloading method and system
CN103716168B (en) Secret key management method and system
CN103729946B (en) Key downloading method, management method, downloading management method and device and system
CN103067401B (en) Method and system for key protection
CN115422558A (en) Method, collection equipment and device for preventing double off-line transaction amount from being tampered

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C53 Correction of patent of invention or patent application
CB03 Change of inventor or designer information

Inventor after: Yao Chengyong

Inventor after: Peng Rongshou

Inventor after: Meng Luqiang

Inventor after: Hong Yixuan

Inventor before: Yao Chengyong

Inventor before: Peng Rongshou

Inventor before: Meng Luqiang

COR Change of bibliographic data

Free format text: CORRECT: INVENTOR; FROM: YAO CHENGYONG PENG RONGSHOU MENG LUQIANG TO: YAO CHENGYONG PENG RONGSHOU MENG LUQIANG HONG YIXUAN

GR01 Patent grant
GR01 Patent grant